2021-03-25 19:19:40 +00:00
|
|
|
pub mod comment;
|
|
|
|
pub mod community;
|
|
|
|
pub mod person;
|
|
|
|
pub mod post;
|
|
|
|
pub mod site;
|
|
|
|
pub mod websocket;
|
|
|
|
|
|
|
|
use crate::site::FederatedInstances;
|
|
|
|
use diesel::PgConnection;
|
|
|
|
use lemmy_db_queries::{
|
|
|
|
source::{
|
|
|
|
community::{CommunityModerator_, Community_},
|
|
|
|
site::Site_,
|
|
|
|
},
|
|
|
|
Crud,
|
|
|
|
DbPool,
|
2021-04-24 22:26:50 +00:00
|
|
|
Readable,
|
2021-03-25 19:19:40 +00:00
|
|
|
};
|
|
|
|
use lemmy_db_schema::{
|
|
|
|
source::{
|
|
|
|
comment::Comment,
|
|
|
|
community::{Community, CommunityModerator},
|
|
|
|
person::Person,
|
|
|
|
person_mention::{PersonMention, PersonMentionForm},
|
2021-04-24 22:26:50 +00:00
|
|
|
post::{Post, PostRead, PostReadForm},
|
2021-03-25 19:19:40 +00:00
|
|
|
site::Site,
|
|
|
|
},
|
|
|
|
CommunityId,
|
|
|
|
LocalUserId,
|
|
|
|
PersonId,
|
|
|
|
PostId,
|
|
|
|
};
|
|
|
|
use lemmy_db_views::local_user_view::{LocalUserSettingsView, LocalUserView};
|
|
|
|
use lemmy_db_views_actor::{
|
|
|
|
community_person_ban_view::CommunityPersonBanView,
|
|
|
|
community_view::CommunityView,
|
|
|
|
};
|
|
|
|
use lemmy_utils::{
|
|
|
|
claims::Claims,
|
|
|
|
email::send_email,
|
|
|
|
settings::structs::Settings,
|
|
|
|
utils::MentionData,
|
|
|
|
ApiError,
|
|
|
|
LemmyError,
|
|
|
|
};
|
|
|
|
use log::error;
|
|
|
|
use serde::{Deserialize, Serialize};
|
|
|
|
use url::Url;
|
|
|
|
|
|
|
|
#[derive(Serialize, Deserialize, Debug)]
|
|
|
|
pub struct WebFingerLink {
|
|
|
|
pub rel: Option<String>,
|
|
|
|
#[serde(rename(serialize = "type", deserialize = "type"))]
|
|
|
|
pub type_: Option<String>,
|
|
|
|
pub href: Option<Url>,
|
|
|
|
#[serde(skip_serializing_if = "Option::is_none")]
|
|
|
|
pub template: Option<String>,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Serialize, Deserialize, Debug)]
|
|
|
|
pub struct WebFingerResponse {
|
|
|
|
pub subject: String,
|
|
|
|
pub aliases: Vec<Url>,
|
|
|
|
pub links: Vec<WebFingerLink>,
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn blocking<F, T>(pool: &DbPool, f: F) -> Result<T, LemmyError>
|
|
|
|
where
|
|
|
|
F: FnOnce(&diesel::PgConnection) -> T + Send + 'static,
|
|
|
|
T: Send + 'static,
|
|
|
|
{
|
|
|
|
let pool = pool.clone();
|
|
|
|
let res = actix_web::web::block(move || {
|
|
|
|
let conn = pool.get()?;
|
|
|
|
let res = (f)(&conn);
|
2021-07-06 13:26:46 +00:00
|
|
|
Ok(res) as Result<T, LemmyError>
|
2021-03-25 19:19:40 +00:00
|
|
|
})
|
|
|
|
.await?;
|
|
|
|
|
2021-07-06 13:26:46 +00:00
|
|
|
res
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn send_local_notifs(
|
|
|
|
mentions: Vec<MentionData>,
|
|
|
|
comment: Comment,
|
|
|
|
person: Person,
|
|
|
|
post: Post,
|
|
|
|
pool: &DbPool,
|
|
|
|
do_send_email: bool,
|
|
|
|
) -> Result<Vec<LocalUserId>, LemmyError> {
|
|
|
|
let ids = blocking(pool, move |conn| {
|
|
|
|
do_send_local_notifs(conn, &mentions, &comment, &person, &post, do_send_email)
|
|
|
|
})
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
Ok(ids)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn do_send_local_notifs(
|
|
|
|
conn: &PgConnection,
|
|
|
|
mentions: &[MentionData],
|
|
|
|
comment: &Comment,
|
|
|
|
person: &Person,
|
|
|
|
post: &Post,
|
|
|
|
do_send_email: bool,
|
|
|
|
) -> Vec<LocalUserId> {
|
|
|
|
let mut recipient_ids = Vec::new();
|
|
|
|
|
|
|
|
// Send the local mentions
|
|
|
|
for mention in mentions
|
|
|
|
.iter()
|
|
|
|
.filter(|m| m.is_local() && m.name.ne(&person.name))
|
|
|
|
.collect::<Vec<&MentionData>>()
|
|
|
|
{
|
2021-07-05 16:07:26 +00:00
|
|
|
if let Ok(mention_user_view) = LocalUserView::read_from_name(conn, &mention.name) {
|
2021-03-25 19:19:40 +00:00
|
|
|
// TODO
|
|
|
|
// At some point, make it so you can't tag the parent creator either
|
|
|
|
// This can cause two notifications, one for reply and the other for mention
|
|
|
|
recipient_ids.push(mention_user_view.local_user.id);
|
|
|
|
|
|
|
|
let user_mention_form = PersonMentionForm {
|
|
|
|
recipient_id: mention_user_view.person.id,
|
|
|
|
comment_id: comment.id,
|
|
|
|
read: None,
|
|
|
|
};
|
|
|
|
|
|
|
|
// Allow this to fail softly, since comment edits might re-update or replace it
|
|
|
|
// Let the uniqueness handle this fail
|
2021-07-05 16:07:26 +00:00
|
|
|
PersonMention::create(conn, &user_mention_form).ok();
|
2021-03-25 19:19:40 +00:00
|
|
|
|
|
|
|
// Send an email to those local users that have notifications on
|
|
|
|
if do_send_email {
|
|
|
|
send_email_to_user(
|
|
|
|
&mention_user_view,
|
|
|
|
"Mentioned by",
|
|
|
|
"Person Mention",
|
|
|
|
&comment.content,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send notifs to the parent commenter / poster
|
|
|
|
match comment.parent_id {
|
|
|
|
Some(parent_id) => {
|
2021-07-05 16:07:26 +00:00
|
|
|
if let Ok(parent_comment) = Comment::read(conn, parent_id) {
|
2021-03-25 19:19:40 +00:00
|
|
|
// Don't send a notif to yourself
|
|
|
|
if parent_comment.creator_id != person.id {
|
|
|
|
// Get the parent commenter local_user
|
2021-07-05 16:07:26 +00:00
|
|
|
if let Ok(parent_user_view) = LocalUserView::read_person(conn, parent_comment.creator_id)
|
2021-03-25 19:19:40 +00:00
|
|
|
{
|
|
|
|
recipient_ids.push(parent_user_view.local_user.id);
|
|
|
|
|
|
|
|
if do_send_email {
|
|
|
|
send_email_to_user(
|
|
|
|
&parent_user_view,
|
|
|
|
"Reply from",
|
|
|
|
"Comment Reply",
|
|
|
|
&comment.content,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Its a post
|
|
|
|
None => {
|
|
|
|
if post.creator_id != person.id {
|
2021-07-05 16:07:26 +00:00
|
|
|
if let Ok(parent_user_view) = LocalUserView::read_person(conn, post.creator_id) {
|
2021-03-25 19:19:40 +00:00
|
|
|
recipient_ids.push(parent_user_view.local_user.id);
|
|
|
|
|
|
|
|
if do_send_email {
|
|
|
|
send_email_to_user(
|
|
|
|
&parent_user_view,
|
|
|
|
"Reply from",
|
|
|
|
"Post Reply",
|
|
|
|
&comment.content,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
recipient_ids
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn send_email_to_user(
|
|
|
|
local_user_view: &LocalUserView,
|
|
|
|
subject_text: &str,
|
|
|
|
body_text: &str,
|
|
|
|
comment_content: &str,
|
|
|
|
) {
|
|
|
|
if local_user_view.person.banned || !local_user_view.local_user.send_notifications_to_email {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(user_email) = &local_user_view.local_user.email {
|
|
|
|
let subject = &format!(
|
|
|
|
"{} - {} {}",
|
|
|
|
subject_text,
|
2021-08-04 21:13:51 +00:00
|
|
|
Settings::get().hostname,
|
2021-03-25 19:19:40 +00:00
|
|
|
local_user_view.person.name,
|
|
|
|
);
|
|
|
|
let html = &format!(
|
|
|
|
"<h1>{}</h1><br><div>{} - {}</div><br><a href={}/inbox>inbox</a>",
|
|
|
|
body_text,
|
|
|
|
local_user_view.person.name,
|
|
|
|
comment_content,
|
|
|
|
Settings::get().get_protocol_and_hostname()
|
|
|
|
);
|
2021-07-05 16:07:26 +00:00
|
|
|
match send_email(subject, user_email, &local_user_view.person.name, html) {
|
2021-03-25 19:19:40 +00:00
|
|
|
Ok(_o) => _o,
|
|
|
|
Err(e) => error!("{}", e),
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn is_mod_or_admin(
|
|
|
|
pool: &DbPool,
|
|
|
|
person_id: PersonId,
|
|
|
|
community_id: CommunityId,
|
|
|
|
) -> Result<(), LemmyError> {
|
|
|
|
let is_mod_or_admin = blocking(pool, move |conn| {
|
|
|
|
CommunityView::is_mod_or_admin(conn, person_id, community_id)
|
|
|
|
})
|
|
|
|
.await?;
|
|
|
|
if !is_mod_or_admin {
|
|
|
|
return Err(ApiError::err("not_a_mod_or_admin").into());
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn is_admin(local_user_view: &LocalUserView) -> Result<(), LemmyError> {
|
2021-03-29 20:24:50 +00:00
|
|
|
if !local_user_view.person.admin {
|
2021-03-25 19:19:40 +00:00
|
|
|
return Err(ApiError::err("not_an_admin").into());
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn get_post(post_id: PostId, pool: &DbPool) -> Result<Post, LemmyError> {
|
2021-04-16 13:10:43 +00:00
|
|
|
blocking(pool, move |conn| Post::read(conn, post_id))
|
|
|
|
.await?
|
|
|
|
.map_err(|_| ApiError::err("couldnt_find_post").into())
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
|
|
|
|
2021-04-24 22:26:50 +00:00
|
|
|
pub async fn mark_post_as_read(
|
|
|
|
person_id: PersonId,
|
|
|
|
post_id: PostId,
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<PostRead, LemmyError> {
|
|
|
|
let post_read_form = PostReadForm { post_id, person_id };
|
|
|
|
|
|
|
|
blocking(pool, move |conn| {
|
|
|
|
PostRead::mark_as_read(conn, &post_read_form)
|
|
|
|
})
|
|
|
|
.await?
|
|
|
|
.map_err(|_| ApiError::err("couldnt_mark_post_as_read").into())
|
|
|
|
}
|
|
|
|
|
2021-03-25 19:19:40 +00:00
|
|
|
pub async fn get_local_user_view_from_jwt(
|
|
|
|
jwt: &str,
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<LocalUserView, LemmyError> {
|
2021-07-05 16:07:26 +00:00
|
|
|
let claims = Claims::decode(jwt)
|
2021-04-16 13:10:43 +00:00
|
|
|
.map_err(|_| ApiError::err("not_logged_in"))?
|
|
|
|
.claims;
|
2021-03-25 19:19:40 +00:00
|
|
|
let local_user_id = LocalUserId(claims.sub);
|
|
|
|
let local_user_view =
|
|
|
|
blocking(pool, move |conn| LocalUserView::read(conn, local_user_id)).await??;
|
|
|
|
// Check for a site ban
|
|
|
|
if local_user_view.person.banned {
|
|
|
|
return Err(ApiError::err("site_ban").into());
|
|
|
|
}
|
|
|
|
|
2021-08-16 20:51:08 +00:00
|
|
|
// Check for user deletion
|
|
|
|
if local_user_view.person.deleted {
|
|
|
|
return Err(ApiError::err("deleted").into());
|
|
|
|
}
|
|
|
|
|
2021-03-25 19:19:40 +00:00
|
|
|
check_validator_time(&local_user_view.local_user.validator_time, &claims)?;
|
|
|
|
|
|
|
|
Ok(local_user_view)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Checks if user's token was issued before user's password reset.
|
|
|
|
pub fn check_validator_time(
|
|
|
|
validator_time: &chrono::NaiveDateTime,
|
|
|
|
claims: &Claims,
|
|
|
|
) -> Result<(), LemmyError> {
|
|
|
|
let user_validation_time = validator_time.timestamp();
|
|
|
|
if user_validation_time > claims.iat {
|
|
|
|
Err(ApiError::err("not_logged_in").into())
|
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn get_local_user_view_from_jwt_opt(
|
|
|
|
jwt: &Option<String>,
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<Option<LocalUserView>, LemmyError> {
|
|
|
|
match jwt {
|
|
|
|
Some(jwt) => Ok(Some(get_local_user_view_from_jwt(jwt, pool).await?)),
|
|
|
|
None => Ok(None),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn get_local_user_settings_view_from_jwt(
|
|
|
|
jwt: &str,
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<LocalUserSettingsView, LemmyError> {
|
2021-07-05 16:07:26 +00:00
|
|
|
let claims = Claims::decode(jwt)
|
2021-04-16 13:10:43 +00:00
|
|
|
.map_err(|_| ApiError::err("not_logged_in"))?
|
|
|
|
.claims;
|
2021-03-25 19:19:40 +00:00
|
|
|
let local_user_id = LocalUserId(claims.sub);
|
|
|
|
let local_user_view = blocking(pool, move |conn| {
|
|
|
|
LocalUserSettingsView::read(conn, local_user_id)
|
|
|
|
})
|
|
|
|
.await??;
|
|
|
|
// Check for a site ban
|
|
|
|
if local_user_view.person.banned {
|
|
|
|
return Err(ApiError::err("site_ban").into());
|
|
|
|
}
|
|
|
|
|
|
|
|
check_validator_time(&local_user_view.local_user.validator_time, &claims)?;
|
|
|
|
|
|
|
|
Ok(local_user_view)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn get_local_user_settings_view_from_jwt_opt(
|
|
|
|
jwt: &Option<String>,
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<Option<LocalUserSettingsView>, LemmyError> {
|
|
|
|
match jwt {
|
|
|
|
Some(jwt) => Ok(Some(
|
|
|
|
get_local_user_settings_view_from_jwt(jwt, pool).await?,
|
|
|
|
)),
|
|
|
|
None => Ok(None),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn check_community_ban(
|
|
|
|
person_id: PersonId,
|
|
|
|
community_id: CommunityId,
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<(), LemmyError> {
|
|
|
|
let is_banned =
|
|
|
|
move |conn: &'_ _| CommunityPersonBanView::get(conn, person_id, community_id).is_ok();
|
|
|
|
if blocking(pool, is_banned).await? {
|
|
|
|
Err(ApiError::err("community_ban").into())
|
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn check_downvotes_enabled(score: i16, pool: &DbPool) -> Result<(), LemmyError> {
|
|
|
|
if score == -1 {
|
|
|
|
let site = blocking(pool, move |conn| Site::read_simple(conn)).await??;
|
|
|
|
if !site.enable_downvotes {
|
|
|
|
return Err(ApiError::err("downvotes_disabled").into());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns a list of communities that the user moderates
|
|
|
|
/// or if a community_id is supplied validates the user is a moderator
|
|
|
|
/// of that community and returns the community id in a vec
|
|
|
|
///
|
|
|
|
/// * `person_id` - the person id of the moderator
|
|
|
|
/// * `community_id` - optional community id to check for moderator privileges
|
|
|
|
/// * `pool` - the diesel db pool
|
|
|
|
pub async fn collect_moderated_communities(
|
|
|
|
person_id: PersonId,
|
|
|
|
community_id: Option<CommunityId>,
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<Vec<CommunityId>, LemmyError> {
|
|
|
|
if let Some(community_id) = community_id {
|
|
|
|
// if the user provides a community_id, just check for mod/admin privileges
|
|
|
|
is_mod_or_admin(pool, person_id, community_id).await?;
|
|
|
|
Ok(vec![community_id])
|
|
|
|
} else {
|
|
|
|
let ids = blocking(pool, move |conn: &'_ _| {
|
|
|
|
CommunityModerator::get_person_moderated_communities(conn, person_id)
|
|
|
|
})
|
|
|
|
.await??;
|
|
|
|
Ok(ids)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn build_federated_instances(
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<Option<FederatedInstances>, LemmyError> {
|
2021-08-04 21:13:51 +00:00
|
|
|
if Settings::get().federation.enabled {
|
2021-03-25 19:19:40 +00:00
|
|
|
let distinct_communities = blocking(pool, move |conn| {
|
|
|
|
Community::distinct_federated_communities(conn)
|
|
|
|
})
|
|
|
|
.await??;
|
|
|
|
|
2021-08-04 21:13:51 +00:00
|
|
|
let allowed = Settings::get().federation.allowed_instances;
|
|
|
|
let blocked = Settings::get().federation.blocked_instances;
|
2021-03-25 19:19:40 +00:00
|
|
|
|
|
|
|
let mut linked = distinct_communities
|
|
|
|
.iter()
|
|
|
|
.map(|actor_id| Ok(Url::parse(actor_id)?.host_str().unwrap_or("").to_string()))
|
|
|
|
.collect::<Result<Vec<String>, LemmyError>>()?;
|
|
|
|
|
|
|
|
if let Some(allowed) = allowed.as_ref() {
|
|
|
|
linked.extend_from_slice(allowed);
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(blocked) = blocked.as_ref() {
|
2021-08-04 21:13:51 +00:00
|
|
|
linked.retain(|a| !blocked.contains(a) && !a.eq(&Settings::get().hostname));
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Sort and remove dupes
|
|
|
|
linked.sort_unstable();
|
|
|
|
linked.dedup();
|
|
|
|
|
|
|
|
Ok(Some(FederatedInstances {
|
|
|
|
linked,
|
|
|
|
allowed,
|
|
|
|
blocked,
|
|
|
|
}))
|
|
|
|
} else {
|
|
|
|
Ok(None)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Checks the password length
|
|
|
|
pub fn password_length_check(pass: &str) -> Result<(), LemmyError> {
|
|
|
|
if pass.len() > 60 {
|
|
|
|
Err(ApiError::err("invalid_password").into())
|
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
2021-04-07 11:40:35 +00:00
|
|
|
|
|
|
|
/// Checks the site description length
|
|
|
|
pub fn site_description_length_check(description: &str) -> Result<(), LemmyError> {
|
|
|
|
if description.len() > 150 {
|
|
|
|
Err(ApiError::err("site_description_length_overflow").into())
|
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|